TEHTRIS DECEPTIVE RESPONSE and its honeypots simulate fake devices and services to deceive intruders who believe they are attacking real assets so that they directly reveal their presence. Honeypots automatically alert and record attacks in video-like streams.
An inventory of the site’s equipment on the local area networks is built up using active techniques by talking to the customer’s switches and also by passive techniques by listening to the flows on the network.
Statistics for large infrastructures indicate an average of around 200 days before detecting an intruder. With our honeypots, if a foreign scan is detected, an alarm is raised in the TEHTRIS XDR Platform console which drastically reduces the detection time. Thanks to our algorithms and TEHTRIS expertise, attacks are distinguished from legitimate traffic without additional work for the SOC teams.
Since its creation, TEHTRIS has taken into account the protection of all data processed in order to ensure the security of the information systems that it is entrusted to. This is not only from the time of development but also each time the TEHTRIS XDR Platform is improved. Security and privacy by design measures are used for each step of the data processing, from the collection of data in your infrastructure to its destruction on our Appliances.
TEHTRIS applies the same principles of security and privacy by design in each of its solutions in order to protect the integrity, confidentiality and authenticity of your data.